An auditing system and method for analyzing email, including capturing email transferred over a network and transferring the email to a data analyzer. The email can be encrypted for safe transfer to the analysis location. Once the email is delivered to the analysis location, it is decrypted and the analysis process begins. The analysis of the email includes scanning the email for specific search terms found in a lexicon and then identifying trends based on scanning results.
Latest Zix Corporation Patents:
This invention relates to data auditing.BACKGROUND
In the information age, organizations of all types have come to rely heavily on electronic mail (email) for conducting business. Email allows a person to communicate, through a computer network, with anyone in the world quickly. This seemingly instantaneous communication enhances productivity within an organization as well as facilitates communication externally. Organizations communicate externally with, for example, clients, business partners, suppliers, distributors, accountants, and attorneys. These electronic communications have become vital to organizations.
However, one problem with the extensive use of email to conduct business is that email often contains confidential information. The disclosure of confidential information can lead to legal liability or result in both financially and reputation damage. Some examples of confidential information include government mandated confidential information, such as, health information protected under the Health Insurance Portability and Accountability Act or personal finance information as protected under the Gramm-Leach-Billey Act. In addition, there are numerous other forms of information that must be protected from disclosure to third parties, such as, attorney-client communications and trade secrets.
Usually, information contained in email is not securely encrypted before being transmitted, therefore creating a risk that confidential information could fall into unauthorized hands. Often information in an email is sent without much thought or concern placed on whether or not confidential information is contained therein. In general, organizations as a whole are unaware of both the nature and amount of confidential information being transmitted though their email systems. As a result, organizations are unable to develop effective and efficient strategies for dealing with the transmission of confidential information.
While it is possible to develop a system that securely encrypts all outgoing email, these systems reduce efficiency by devoting time and resources to encrypting email that does not contain any confidential information, and thus delay potentially time sensitive communications needlessly. Additionally, if all email is encrypted recipients require the ability to decrypt the email.SUMMARY
In one implementation, the invention provides an auditing system and method for analyzing email. The method includes capturing email transferred over a network. The mail can be transferred to a data analyzer. The email can be encrypted for safe transfer to an analysis location. Once the email is delivered to the analysis location it is decrypted and the analysis process begins. The analysis of the email includes scanning the email for specific search terms found in a lexicon and then identifying trends based on scanning results.
The auditing system can be used to inform organizations regarding the nature and amount of confidential information passing though their email system. Analysis can be useful to an organization in developing policies and protocols for dealing with confidential information that are finely tailored to the specific email and users. A tailored solution results in less email delay, while at the same time protecting most confidential information from disclosure.
The details of one or more implementations of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims.
Like reference symbols in the various drawings indicate like elements.DETAILED DESCRIPTION
The present invention provides a unique system and method for collecting email, scanning email, and analyzing these results to develop trend information. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that these specific details need not be used to practice the present invention. Also, specific examples of networks, components, and formats are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to limit the invention from that described in the claims. Additionally, in other circumstances, well known structures, materials, circuits, and interfaces have not been shown or described in detail in order not to unnecessarily obscure the present invention.
An auditing system and method is provided which allows for the scanning of collected email for terms defined in a specialized lexicon and analyzing the scanning results for trend information. Reports based on the analysis results allow clients to develop more effective email policies and procedures. In one implementation, the focus of the auditing system is to allow clients to identify email security vulnerabilities by determining trends based on an analysis of confidential information contained in email.
Referring now to
Wide Area Networks are networks where the geographic separation between connected computer systems is greater. Wide Area Networks may be public or private. The Internet is an example of a public Wide Area Network. Network 110 represents a public network. Transmitting information though a public network is riskier than though a private network, because unauthorized persons may be able to access the transmitted information more easily.
Email often moves though the network 110 in order to transfer email from one computer to another. Server 140 is coupled to network 110 and includes a capture device 180 for use in the auditing system. Server 140 lies behind firewall 150 and is connected to many local network machines, such as computers 160 and printer 170. In this simplified implementation, all email outgoing from local network computers 160 must pass through server 140 in order to reach network 110 and further destinations, such as computer 120. Similarly, all incoming email must enter the local network from network 110 through server 140 and then can be accessed on local computer 160.
Capture device 180 is shown coupled to server 140. Email can be captured in several possible locations within a local network. For example, a local network may contain a separate mail server. In one implementation, there is no direct coupling of capture device 180 to analysis device 190 at the time of email capture. Analysis device 190 is shown in
In one implementation, once the capture of the email is complete, the email is physically transported to a remote site for analysis. The analysis process can involve several steps, including decrypting the email collected by the capture device, scanning the email, and determining trends based on the email.
The auditing system utilizes a capture device 180 to collect a copy of all email flowing in and out of a client network over a given period. This period will vary based on email volume and client considerations. In one implementation, the capture period is three working days. This allows for the analysis of a representative sample of email though the email system. Capture device 180 can take many different forms, including a data collector that can be used to copy email as it enters or leaves a computer network. The flow of email in and out of the client network can be nearly uninterrupted by the capture process. To ensure that the email is uninterrupted, the incoming and outgoing emails are unchanged by capture device 180. In another implementation, capture device 180 receives a collection of email already stored on client server 140. The email transferred to capture device 180 may only represent a selection of the overall email collected. This implementation results in a shorter capture time than the real-time capture method described above. In yet another implementation, only a ratio of the total amount of email transferred over the network is captured. For example, one email out of every 50 can be captured.
In a further implementation of capture device 180, the email is encrypted after capture for more secure storage. For simplicity, capture device 180 is described as performing both the storage and encryption, but separate devices can be used for storage and encryption. Furthermore, the encryption step may take place in concert with each copying of email or the email may be encrypted as a whole following completion of capture.
In one implementation, the email is encrypted with a randomly generated 168-bit (Triple-DES) symmetric key and the symmetric key is encrypted using a 1024-bit asymmetric encryption. The asymmetric key encryption system, also known as a public key encryption system, involves two keys, a public key and a private key. The public key is readily available to people for the purpose of encrypting email. However, only the private key may be used to decrypt the email once it has been encrypted using the corresponding public key. One example of asymmetric key encryption is RSA. In the present implementation, once the email is encrypted it can only be decrypted by an appropriate private key. Alternatively, the email can be encrypted using a symmetric key derived from a pass phrase.
In another implementation, instead of capturing email, documents captured by device 180 can be collected for analysis. A representative sample of documents are collected and encrypted by capture device 180 for transfer to the remote analysis site where the document text can be analyzed in a similar manner to the email.
Referring now to
Scanning device 220 scans each email for terms, expressions, and masks defined in lexicon 230. In one implementation, the scanning device 220 scans both email headers and text as well as attachments. The scanning method is described further below in association with
Referring now to
Attachments are files that are often transmitted with the email. Attachments are a useful way to send files such as word processing documents, because the formatting is preserved and others can easily access the file. For example, documents created using Microsoft® Word can be attached to an outgoing email as a Word document. The recipient can then view the file using Microsoft® Word preserving all the document formatting. Since attachments are often in the form of documents that may contain confidential information, it is important that they are scanned. Some types of attachment files, such as a PDF file or a document that has been converted to an image, may not contain any recognizable original text. If the attachment can be converted to a type containing recognizable text, the converted attachment can be scanned for confidential information. Even if the file is not in a recognizable format, the file is scanned in case recognizable text can be identified. If the attachment is a compressed archival file with a known compression format, such as a zip file, the file may be decompressed into original files so that the original files can be scanned.
Scanning device 220 must then determine whether a lexicon term was found within the email. If there is a hit (the “YES” branch of step 330), the application records information (step 340) about the hit in, for example, inspection database 240. In one implementation, a hit is defined as an instance when scanning device 220 determines that the email contains a term found in lexicon 230. In one implementation, information about the type of hit can be stored, including the category and subcategory of the term discovered from lexicon 230, but the actual confidential information is not stored. For example, if a scan reveals that an email contains a Social Security Number, information is recorded about the type of term found (a Social Security Number) but the actual number itself is not recorded. In another implementation, the actual content information is stored. In yet another implementation, scanning device 220 records not just the type of hit made by the scan, but also the domain information, so that information regarding the email sender and recipient can be collected. If the email with the hit recorded is the last email (the “YES” branch of step 350), the scanning process ends. If there is more email (the “NO” branch of step 350), the scanning process returns to step 310.
If there is no hit in an email (the “NO” branch of step 330), the scanning process determines whether the scanned email was the last email (step 360). If there is another email (the “NO” branch of step 360), the scanning process returns to step 310. If there is no more email (the “YES” branch of step 360), the scanning process ends. If more than one hit is in an email, then the details of each hit are recorded.
Referring now to
An example lexicon 230 is subdivided into two categories 410, mandated and prudent confidential information. Mandatory confidential information includes information which must be protected by law. Prudent confidential information includes information which is protected for business and legal reasons. Each category 410 can then be subdivided into multiple subcategories 420.
Found at subcategory level 420 are different areas of information which fall under the broad mandatory category. For example, subcategories 420 cover areas such as national security, legal, health, and human resources information. This first set of subcategories 420 begins the narrowing process leading to specific search terms.
Each subcategory 420 may include another hierarchy of second subcategories 430. For example, the health information subcategory 420 can include a number of second subcategories 430, such as substance abuse, medical record, Health Insurance Portability and Accountability Act (HIPAA) identifier, genetic, and HIV/AIDS information. These second subcategories 430 then include a number of specific search terms 440. For example, under HIPAA identifiers can be found several possible search terms 440, such as name, physical address, Social Security Number, age, and IP address. Each term 440 then is associated with a set of labels 450 and masks 460, which are used in the scanning process to find different variations of the same search term 440.
Taking the example term of “Social Security Number”, there are several different labels that are associated with the search term “Social Security Number”. A label is a predefined alternative to the terms which, when found in a scan, are treated as if the lexicon term itself was found. Labels that may be used as search items for the term “Social Security Number” include: Social Security Number, Soc. Sec. #, SS#, and SSN. By including these labels, a scan is more likely to find a hit of a Social Security Number within an email.
Additionally, using masks expands the likelihood of discovering a lexicon term. A mask is a type of filter that is used to include or exclude values based on some criteria. Again, using the case of a Social Security Number as an example, there are several different masks that may be used to discern the different ways in which the actual numbers themselves may be provided. Since the actual numbers themselves are irrelevant, a mask that looks for any numbers in certain nine digit formats is used, such as: XXX-XX-XXXX, XXX XX XXXX, and XXXXXXXXX. Note that each “X” represents a digit from 0-9. The mask does not care what number is actually present, the mask just looks at the format of the number string for a match. The use of a mask again enhances the ability to discover the desired lexicon term during an email scan containing such confidential information.
Lexicon 230 can include be a general set of keywords, expressions, and phrases for a given type of search, such as a search for terms relating to confidential information. However, lexicon 230 can also be custom designed to meet the needs of a specific client. This generally involves generating new search terms not found in the general lexicon, but important to the client. For example, if a client wants to know how often a product, such as a widget, is mentioned over email, the term “widget” can be added to the lexicon under an appropriate category and subcategory setting. Consequently, when the scan is run on captured email and “widget” is found, it will be recorded as a hit in the same manner as described above.
In one implementation, the record of each hit is placed in an inspection database. The inspection database provides information about each email containing a hit so that trends can be analyzed.
Referring again to
Information can be provided regarding a comparison of the categories and subcategories of the terms discovered in the email, giving a client an idea of the types of information passing though their email system. For example, a client may learn that 60% of the confidential information being sent through email falls in the mandated category. Furthermore, of that 60% perhaps half is from the health subcategory, 85% dealing with medical records. In another example, scanning may reveal small levels of confidential information related to age, address, and Social Security Number, that all are contained within the same subcategory of HIPAA Identifiers. Therefore, this analysis provides the clients with information about the types of confidential information at several levels of specificity gives a clearer picture of the email entering or exiting the systems. Trend device 250 can thus be useful to clients to develop carefully tailored email encryption protocols.
Information can also be analyzed based on category and domain. For example, it may be determined though analysis that 40% of all medical record information is sent between two particular parties. Thus, when most of the email from one person to another is confidential in nature, say from an employee to an insurance company, the system can be configured to encrypt every email sent by that employee to the insurance company. Analysis can also be focused on the destination domain of the confidential information, regardless of the sender. Comparisons can then be made of the types of confidential information going to different specific domains.
Further, information regarding the type of files containing the confidential information be analyzed. For example, perhaps most of the confidential information is being transmitted though attached Microsoft® Word documents. If this is the case, the client can develop better strategies for dealing with transmissions containing attached Microsoft® Word documents.
It is understood that the preceding analysis features are designed to illustrate the types of trend analysis that can be performed based on the types of information recorded following a representative capture and scan of all email. Some features of the disclosure will be used without corresponding use of other features. Furthermore, additional features may be employed without changing the operation of the present invention. Accordingly, it is appropriate that the appended claims be construed broadly and in a manner consistent with the disclosure.
The invention can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. The invention can be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers. A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
Method steps of the invention can be performed by one or more programmable processors executing a computer program to perform functions of the invention by operating on input data and generating output. Method steps can also be performed by, and apparatus of the invention can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in special purpose logic circuitry.
1. A method for analyzing email comprising the steps of:
- capturing email transferred over a network without interfering with the delivery of the email;
- transferring the captured email to a data analyzer; and
- analyzing the captured email, including:
- scanning the captured email for search terms defined in a lexicon, the lexicon having a structure and including a hierarchy having one or more general categories, wherein one of the one or more general categories is confidential information, which contains one or more subcategories that are types of confidential information, and the method further comprises: identifying trends based on the types of confidential information contained in the email as defined in the one or more subcategories.
2. The method of claim 1, wherein:
- capturing email transferred over a network includes copying the email.
3. The method of claim 1, wherein:
- capturing email transferred over a network includes receiving a sampling of the email.
4. The method of claim 1, wherein:
- capturing email transferred over a network includes receiving a copy of email already transferred to the network.
5. The method of claim 1, wherein:
- capturing email transferred over the network includes capturing email over a specific period.
6. The method of claim 1, wherein:
- capturing email transferred over the network includes capturing a selected ratio of all the email transferred over the network.
7. The method of claim 1, further comprising:
- encrypting the email after capture and decrypting the email before analysis.
8. The method of claim 1, further comprising:
- receiving the email from and transferring the email to a server.
9. The method of claim 1, wherein:
- the email includes electronic documents.
10. The method of claim 1, wherein:
- analyzing the captured email includes storing the types of confidential information identified, without storing the confidential information.
11. The method of claim 1, further comprising:
- identifying the confidential information with the search terms.
12. The method of claim 1, wherein:
- the one or more subcategories include a label, the label being a predefined alternative to the search terms; and
- the scanning step includes searching the email for both the search terms and the label.
13. The method of claim 1, wherein:
- the one or more subcategories include a mask, the mask being a filter used to include or exclude values from the search terms based on a predefined criteria; and
- the scanning step includes searching the email for both the search terms and masked versions of the search terms.
14. The method of claim 13, wherein:
- the mask defines a specified format of digits.
15. The method of claim 13, wherein:
- the mask defines a nine digit format for a social security number.
16. The method of claim 1,
- where the one or more subcategories include at least two sub-categories, where at least one subcategory is mandatory and at least one subcategory is permissive.
17. The method of claim 1, wherein:
- the email is email entering a network.
18. The method of claim 1, wherein:
- the email is email exiting a network.
19. The method of claim 1, wherein each search term associates with one of said general categories, and
- said scanning the captured email includes scanning each email based on the one or more general categories.
20. The method of claim 1, where identifying trends based on the types of confidential information contained in the email as defined in the one or more subcategories includes identifying patterns of transmission of confidential information transferred over the network.
21. The method of claim 20, further comprising developing one or more encryption protocols based on the identified nature of the confidential information.
22. The method of claim 21, further comprising encrypting the captured email using the one or more encryption protocols prior to transferring the captured email to the data analyzer.
23. A method of analyzing email, comprising:
- capturing a copy of the email transferred over a network;
- encrypting a copy of the email for safe transfer;
- transferring the encrypted copied email to a data analyzer;
- decrypting the encrypted copied email; and
- analyzing the copied email, including:
- scanning the copied email message for specific search terms found in a lexicon, the lexicon having a structure and including a hierarchy having one or more general categories; and
- identifying trends based on results of the scanning,
- wherein one of the one or more general categories is confidential information, which contains one or more subcategories that are types of confidential information, and
- wherein identifying trends based on results of the scanning includes identifying trends based on the types of confidential information contained in the email as defined in the one or more subcategories.
24. The method of claim 23, wherein said analyzing the copied email includes analyzing the trends to provide information associated with the one or more general categories defined in the lexicon.
25. The method of claim 23, wherein scanning the copied email message for specific search terms found in a lexicon includes scanning for specific search terms found in a hierarchy including one or more general categories, each category having one or more subcategories,
- wherein each general category and subcategory specify a different level of search.
26. The method of claim 23, where identifying trends based on the types of confidential information contained in the email as defined in the one or more subcategories includes identifying patterns of transmission of confidential information transferred over the network.
27. The method of claim 26, further comprising developing one or more encryption protocols based on the identified nature of the confidential information.
28. The method of claim 27, where encrypting a copy of the email includes encrypting the copied email using the one or more encryption protocols prior to transferring the copied email to the data analyzer.
29. A system for capturing and analyzing email comprising:
- a capture device that records email over a specified period without interfering with the delivery of the email; and
- an analysis device that includes: a scanning device that scans the email for terms defined in a lexicon, the lexicon including a structure and a hierarchy having one or more general categories, wherein one of the one or more general categories is confidential information, which contains one or more subcategories that are types of confidential information, the system further includes:
- a trend device to identify a trend based on the types of confidential information contained in the email as defined in the one or more subcategories.
30. The system of claim 29, wherein:
- the capture device is not directly coupled to the analysis device at the time of email capture.
31. The system of claim 29, wherein:
- the capture device is located within a client's firewall.
32. The system of claim 29, wherein:
- the capture device is operably coupled to a mail server.
33. The system of claim 29, wherein:
- the capture device receives a collection of email already stored on a server.
34. The system of claim 29, wherein:
- the capture device receives a sampling of the email.
35. The system of claim 29, wherein:
- the trend device generates trends based on email domains.
36. The system of claim 29, wherein:
- the scanning device scans email headers, text, and attachments.
37. The system of claim 29, wherein:
- the capture device records electronic documents.
38. The system of claim 29, wherein:
- the capture device records email entering a network.
39. The system of claim 29, wherein:
- the capture device records email exiting a network.
40. The system of claim 29, wherein:
- an encryption device is coupled to the capture device and encrypts all the email recorded by the capture device.
41. The system of claim 29, wherein:
- the email from the capture device is encrypted; and
- the analysis device further includes a decryption device for decrypting encrypted email.
42. The system of claim 29, wherein:
- the analysis device further includes an inspection database that collects information about the email.
43. The system of claim 29, wherein:
- the lexicon includes a one or more labels and masks, each label being a predefined alternative to the terms and each mask being a filter used to include or exclude values from the terms based on a predefined criteria.
44. The system of claim 43, wherein:
- at least one of the one or more masks defines a nine digit format for a social security number.
45. The system of claim 29, wherein:
- the one or more subcategories include at least two subcategories, where at least one subcategory is mandatory and at least one subcategory is permissive.
46. The system of claim 29, wherein each term associates with one of said general categories, and
- said scanning device scans the email based on the one or more general categories.
47. The method of claim 29, where the trend device is configured to identify patterns of transmission of confidential information transferred over the network based on the trend.
48. The method of claim 47, where the capture device is configured to develop one or more encryption protocols based on the identified nature of the confidential information.
49. The method of claim 48, where the capture device is further configured to encrypt the email prior to being scanned by the scanning device using the one or more encryption protocols.
|5963965||October 5, 1999||Vogel|
|6421709||July 16, 2002||McCormick et al.|
|6647383||November 11, 2003||August et al.|
|20020062368||May 23, 2002||Holtzman et al.|
|20020103873||August 1, 2002||Ramanathan et al.|
|20030110162||June 12, 2003||Newman|
|20030131319||July 10, 2003||Hintz|
|20030191689||October 9, 2003||Bosarge et al.|
|20030233414||December 18, 2003||Henry|
|20040133645||July 8, 2004||Massanelli et al.|
|20040153515||August 5, 2004||Touboul et al.|
|20050240939||October 27, 2005||Motoyama et al.|
|WO 01/97089||December 2001||WO|
|WO 2004/003704||January 2004||WO|
International Classification: G06F 15/16 (20060101);